-
Notifications
You must be signed in to change notification settings - Fork 117
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ci: Attempt to fix build (update py-gi-docgen
)
#651
Conversation
There is/was something else going on with |
I'll merge this, but is there any way we can prevent this from breaking again with the next Python update? |
I'm not super familiar with |
Can you test/add that? I don't have much knowledge about FreeBSD in particular, but it would be nice to not run into this issue every so often. You can ignore the failure on Debian Testing, I'll be looking into that later (it's a weird one, and definitely caused by some package update in Testing). |
Sure - just so that you're aware: I'm relying on the GitHub Actions continuous integration results to test the results; I'll push a commit to attempt the generic versionless package name in a few moments. |
Ah, oops: Cirrus CI in this case (nitpicking my description; it's a GitHub CI check.. but run via Cirrus CI). |
This looks good! Thank you! :-) |
You're welcome - thanks! |
The change to disable |
It's caused by stricter seccomp rules in newer Podman versions. I haven't tested which ones cause this issue though, and since this is not security relevant at all for how we use Podman, just disabling seccomp was the easy and quick way out. |
Yep, I just think it might be useful to understand with a bit more precision. There's a possibility that it's related to The golang Since the rule fix was to add Again - not 100% sure about this, but I think that might fit. |
That actually sounds like an incredibly reasonable explanation! No sure how many people this is hitting (clearly not a critical mass of people...), but I could be worth fixing globally. |
I guess the set intersection of folks using Fortunately I think the issue is already fixed, so what's left is mostly a case of waiting until updated dependencies land in Ubuntu -- and then we should be able to revert bf6a2a9. To confirm the theory I was considering generating a JSON seccomp policy from the current ( |
In hindsight that doesn't seem likely to be true - so perhaps there is something more specific about the way that |
I think the bug involves the intersection of all of:
I expected that adding the following command before
...however, based on testing on my fork: it doesn't seem to. I'm now 99% confident that |
I attempted to replicate the (I realize this is getting a bit off-topic and that it probably doesn't really matter what the exact cause is, since we have a workaround -- but I have some time to investigate and would like to confirm what's going on here if feasible) |
Ok, here's what I find to be fairly strong evidence that Debian Stable
Debian Testing
(log format narrowed to remove per-line timestamps and unrelated processid (pid) activity) This does not comprehensively answer why adding |
Ah, I think I understand: in order for The output of another build indicates that the GitHub Actions continuous integration Perhaps it may be possible to update |
Note: this was the incorrect version of Ubuntu to attempt to replicate the problem on; the release version number of |
Attempts to resolve Cirrus continuous integration failures observed for recent pull requests / commits.